1,659 research outputs found
Artificial intelligence in the cyber domain: Offense and defense
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.Web of Science123art. no. 41
Towards a Feature Rich Model for Predicting Spam Emails containing Malicious Attachments and URLs
Malicious content in spam emails is increasing in the form of attachments and URLs. Malicious attachments and URLs attempt to deliver software that can compromise the security of a computer. These malicious attachments also try to disguise their content to avoid virus scanners used by most email services to screen for such risks. Malicious URLs add another layer of disguise, where the email content tries to entice the recipient to click on a URL that links to a malicious Web site or downloads a malicious attachment. In this paper, based on two real world data sets we present our preliminary research on predicting the kind of spam email most likely to contain these highly dangerous spam emails. We propose a rich set of features for the content of emails to capture regularities in emails containing malicious content. We show these features can predict malicious attachments within an area under the precious recall curve (AUC-PR) up to 95.2%, and up to 68.1% for URLs. Our work can help reduce reliance on virus scanners and URL blacklists, which often do not update as quickly as the malicious content it attempts to identify. Such methods could reduce the many different resources now needed to identify malicious content
Malicious code detection architecture inspired by human immune system
Malicious code is a threat to computer systems globally. In this paper, we outline the evolution of malicious code attacks. The threat is evolving, leaving challenges for attackers to improve attack techniques and for researchers and security specialists to improve detection accuracy. We present a novel architecture for an effective defense against malicious code attack, inspired by the human immune system. We introduce two phases of program execution: Adolescent and Mature Phase. The first phase uses a malware profile matching mechanism, whereas the second phase uses a program profile matching mechanism. Both mechanisms are analogous to the innate immune syste
Malware Detection and Prevention
Malware first appeared in 1971, before broadband internet even existed. The first variations began with people just testing what they could do and were not malicious. Eventually, that time came to an end once cybercriminals began to realize that they could wreak havoc and profit from creating malware. Almost at the same time, cybersecurity was created to help combat these viruses and malicious attacks by cybercriminals. This project paper will dive into the technical issues that arise from malware detection and prevention. It starts with defining malware and goes over the history of malware from its birth to today. Then this paper will list all of the different variations of malware and the processes they execute to break into systems and propagate. Next, it goes over the different variations of malware defenses, starting with antivirus software. The paper will define antivirus software and how it functions as well as provide a history. Then it will dive into cryptographic defenses to define, provide history, and explain the methods employed by cryptography. Finally, it will go over firewalls explaining how they function and their history. Malware will never cease to exist, so it is highly important to consider what computer and network technologies you should employ to protect yourself. This paper isn’t just to dismiss malware but to help people understand better how these technologies can work to prevent malware attacks both during and before the attack even happens.
Key Words: Malware, Antivirus Software, Cryptography, Firewall, Key, Cipher, Gatewa
A model for multi-attack classification to improve intrusion detection performance using deep learning approaches
This proposed model introduces novel deep learning methodologies. The
objective here is to create a reliable intrusion detection mechanism to help
identify malicious attacks. Deep learning based solution framework is developed
consisting of three approaches. The first approach is Long-Short Term Memory
Recurrent Neural Network (LSTM-RNN) with seven optimizer functions such as
adamax, SGD, adagrad, adam, RMSprop, nadam and adadelta. The model is evaluated
on NSL-KDD dataset and classified multi attack classification. The model has
outperformed with adamax optimizer in terms of accuracy, detection rate and low
false alarm rate. The results of LSTM-RNN with adamax optimizer is compared
with existing shallow machine and deep learning models in terms of accuracy,
detection rate and low false alarm rate. The multi model methodology consisting
of Recurrent Neural Network (RNN), Long-Short Term Memory Recurrent Neural
Network (LSTM-RNN), and Deep Neural Network (DNN). The multi models are
evaluated on bench mark datasets such as KDD99, NSL-KDD, and UNSWNB15 datasets.
The models self-learnt the features and classifies the attack classes as
multi-attack classification. The models RNN, and LSTM-RNN provide considerable
performance compared to other existing methods on KDD99 and NSL-KDD datase
- …